How many usable IP addresses are available on the 192.168.1.0/27 network

256

254

62

30

16

32

Question 2

Which subnet would include the address 192.168.1.96 as a usable host address?

192.168.1.64/26

192.168.1.32/27

192.168.1.32/28

192.168.1.64/29

Question 3

What single subnet mask would be appropriate to use for the three subnetworks? • 255.255.255.0 • 255.255.255.240 •

255.255.255.0

255.255.255.240

255.255.255.248

255.255.255.252

Question 4

Which statement is true about variable-length subnet masking?

Each subnet is the same size.

The size of each subnet may be different, depending on requirements.

Subnets may only be subnetted one additional time.

Bits are returned, rather than borrowed, to create additional subnets.

Question 5

Which subnet would include the address 192.168.1.96 as a usable host address?

255.255.255.0

255.255.255.128

255.255.255.192

255.255.255.224

255.255.255.240

Question 6

What are two characteristics shared by TCP and UDP? (Choose two.)

Default window size

Connectionless communication

Port numbering

3-way handshake

Ability to to carry digitized voice

Use of checksum

Question 7

Why are port numbers included in the TCP header of a segment?

To indicate the correct router interface that should be used to forward a segment

To identify which switch ports should receive or forward the segment

To determine which Layer 3 protocol should be used to encapsulate the data

To enable a receiving host to forward the data to the appropriate application

To allow the receiving host to assemble the packet in the proper order

Question 8

Which two protocols operate at the highest layer of the TCP/IP protocol stack? (Choose two.)

DNS

Ethernet

IP

POP

TCP

UDP

Question 9

What is one difference between the client-server and peer-topeer network models?

Only in the client-server model can file transfers occur.

Every device in a peer-to-peer network can function as a client or a server.

A peer-to-peer network transfers data faster than a transfer using a client-server network.

A data transfer that uses a device serving in a client role requires that a dedicated server be present.

Question 10

Which networking model is being used when an author uploads one chapter document to a file server of a book publisher?

Peer-to-peer

Master-slave

Client/server

Point-to-point

Question 11

What network service resolves the URL entered on a PC to the IP address of the destination server?

DNS

DHCP

FTP

SNMP

Question 12

A network engineer is analyzing reports from a recently performed network baseline. Which situation would depict a possible latency issue?

A change in the bandwidth according to the show interfaces output

A next-hop timeout from a traceroute

An increase in host-to-host ping response times

A change in the amount of RAM according to the show version output

Question 13

Which firewall feature is used to ensure that packets coming into a network are legitimate responses to requests initiated from internal hosts?

Stateful packet inspection

URL filtering

Application filtering

Packet filtering

Question 14

A medium-sized business is researching available options for connecting to the Internet. The company is looking for a high speed option with dedicated, symmetric access. Which connection type should the company choose?

DSL

Dialup

Satellite

Leased line

Cable modem

Question 15

What is the purpose of having a converged network?

To provide high speed connectivity to all end devices

To make sure that all types of data packets will be treated equally

To achieve fault tolerance and high availability of data network infrastructure devices

To reduce the cost of deploying and maintaining the communication infrastructure

Question 16

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

Reliability

Scalability

Quality of service

Accessibility

Question 17

Which connection provides a secure CLI session with encryption to a Cisco switch?

A console connection

An AUX connection

A Telnet connection

An SSH connection

Question 18

A network technician is attempting to configure an interface by entering the following command: SanJose(config)# ip address 192.168.2.1 255.255.255.0. The command is rejected by the device. What is the reason for this?

The command is being entered from the wrong mode of operation.

The command syntax is wrong.

The subnet mask information is incorrect.

The interface is shutdown and must be enabled before the switch will accept the IP address.

Question 19

After several configuration changes are made to a router, the copy running-configuration startup-configuration command is issued. Where will the changes be stored?

Flash

ROM

NVRAM

RAM

The configuration register

A TFTP server

Question 20

The banner message is too long.

The delimiting character appears in the banner message.

The symbol “!” signals the end of a banner message.

Message-of-the-day banners will only appear when a user logs in through the console port.

Question 21

What are three characteristics of an SVI? (Choose three.)

It is designed as a security protocol to protect switch ports.

It is not associated with any physical interface on a switch.

It is a special interface that allows connectivity by different types of media.

It is required to allow connectivity by any device at any location.

It provides a means to remotely manage a switch.

It is associated with VLAN1 by default.

Question 22

A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdownWhat is the technician configuring?

Telnet access

SVI

Password encryption

Physical switchport access

Question 23

In computer communication, what is the purpose of message encoding?

To convert information to the appropriate form for transmission

To interpret information

To break large messages into smaller frames

To negotiate correct timing for successful communication

Question 24

What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server?

TCP

IP

HTTP

Ethernet

Question 25

What is the process of dividing a data stream into smaller pieces before transmission?

Segmentation

Encapsulation

Encoding

Flow control

Question 26

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

DNS server address

Subnet mask

Default gateway

DHCP server address

Question 27

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

Presentation layer

Network layer

Physical layer

Data link layer

Question 28

A network engineer is measuring the transfer of bits across the company backbone for a mission critical database application. The engineer notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence t

The amount of traffic that is currently crossing the network

The sophistication of the encapsulation method applied to the data

The type of traffic that is crossing the network

The latency that is created by the number of network devices that the data is crossing

The bandwidth of the WAN connection to the Internet

The reliability of the gigabit Ethernet infrastructure of the backbone

Question 29

Which type of UTP cable is used to connect a PC to a switch port?

Console

Rollover

Crossover

Straight-through

Question 30

What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.

It provides delimitation of data according to the physical signaling requirements of the medium.

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

It defines software processes that provide services to the physical layer.